Microsoft Internet Explorer (MSIE) is the default [[Web Browser]] included with [[Microsoft Windows]].

+

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

−

== MSIE 4 to 9 ==

+

== Virus ==

−

MSIE 4 to 9 uses the [[Internet Explorer History File Format]] (or MSIE 4-9 Cache File format). The Cache Files commonly named index.dat are used to store both cache and historical information.

+

A computer program that can automatically copy itself and infect a computer.

−

== MSIE 10 ==

+

== Worm ==

−

<pre>

+

A self-replicating computer program that can automatically infect computers on a network.

−

C:\Users\%USER%\AppData\Local\Microsoft\Windows\WebCache\

+

−

</pre>

+

−

The WebCacheV01.dat and WebCacheV24.dat files are in the [[Extensible Storage Engine (ESE) Database File (EDB) format]]

+

== Trojan horse ==

+

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

−

== Configuration ==

+

== Spyware ==

−

Internet Explorer will apply its setting in the following order, where the lower the order overrides settings in the higer order.

+

A computer program that can automatically intercept or take partial control over the user's interaction.

−

# Settings in Machine policy key

+

−

# Settings in User policy key

+

−

# Settings in User preference key

+

−

# Settings in Machine preference key

+

−

Machine policy key

+

== Exploit Kit ==

−

<pre>

+

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.

A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to an operating system.

* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010

−

3 - Internet Zone

+

* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard, July 2, 2013

Revision as of 02:12, 5 July 2014

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Drive-by-download

Rootkit

A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to an operating system.